ARTICLES

How Facebook Compromised Millions of Instagram Users’ Passwords

Recently, Facebook disclosed that it stored millions of Instagram users’ passwords in plain text, leaving them open to potential malicious elements. Read on to...

All About The New Variant of Hawkeye keylogger ‘Reborn v9’

A new variant of Hawkeye keylogger ‘Reborn v9’ has emerged to steal sensitive information from organizations. Read on to know about the latest malware... From...

All About the Newly Discovered RobinHood Ransomware

The newly discovered RobinHood ransomware is spreading havoc in North Carolina and penalty of $10K per day is to be paid by victims. Read...

How Hackers Exploited the Yuzo WordPress Plugin

Recently, a vulnerability in WordPress plugin ‘Yuzo related posts’ was been exploited by the hackers. Read on to know more about it... Recently, a vulnerability...

NEWS

New Scranos rootkit malware pillages passwords and payment accounts

Source: Cyware | By Ryan Stewart • The malware can extract cookies and steal login credentials from popular browsers such as Google Chrome and Mozilla...

Eight unsecured databases found leaking nearly 60 million LinkedIn users’ information

Source: Cyware | By Ryan Stewart • The total size of databases is estimated to be 229 GB. • As of April 15, 2019, the databases...

Ukranian Government and Military targeted with spear phishing campaign

Source: Cyware | By Ryan Stewart • The spear phishing campaign drops a powerful backdoor dubbed ‘RATVERMIN’ as part of a second-stage payload delivered with...

Orange Cyberdefense and Gatewatcher sign the first strategic partnership

Orange Cyberdefense and Gatewatcher sign the first strategic partnership between service providers with French National Cybersecurity Agency (ANSSI) accreditation For the first time, two companies...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...